New Finding on Factoring Prime Power RSA Modulus N = p r q

Size: px
Start display at page:

Download "New Finding on Factoring Prime Power RSA Modulus N = p r q"

Transcription

1 Jounal of Mathematical Reseach with Applications Jul., 207, Vol. 37, o. 4, pp DOI:0.3770/j.issn: ew Finding on Factoing Pime Powe RSA Modulus = p q Sadiq SHEHU, Muhammad Rezal Kamel ARIFFI,2,. Al-Kindi Cyptogaphy Reseach Laboatoy, Institute fo Mathematical Reseach, Univesiti Puta Malaysia, UPM Sedang, Selango, Malaysia; 2. Depatment of Mathematics, Faculty of Science, Univesiti Puta Malaysia, UPM Sedang, Selango, Malaysia Abstact This pape poposes thee new attacks. In the fist attack we conside the class of the public exponents satisfying an equation ex Y + (ap + bq )Y = Z fo suitably small positive integes a, b. Applying continued factions we show that Y can be ecoveed among X the convegents of the continued faction expansion of e. Moeove, we show that the numbe of such exponents is at least 2 (+) ε whee ε 0 is abitaily small fo lage. The second and thid attacks woks upon k RSA public keys ( i, e i ) when thee exist k elations of the fom e ix iy i + (ap i + bqi )y i = z i o of the fom e ix i iy + (ap i + bqi )y = z i and the paametes x, x i, y, y i, z i ae suitably small in tems of the pime factos of the moduli. We apply the LLL algoithm, and show that ou stategy enables us to simultaneously facto k pime powe RSA moduli. Keywods RSA pime powe; factoization; LLL algoithm; simultaneous diophantine appoximations; continued faction MR(200) Subject Classification A5; A55; K60. Intoduction The undelying one-way function of RSA is the intege factoization poblem: Multiplying two lage pimes is computationally easy, but factoing the esulting poduct is vey had. It is also well known that the secuity of RSA is based on the difficulty of solving the so-called RSA poblem: Given an RSA public key (e, ) and a ciphetext c m e (mod ), compute the plaintext m. The RSA poblem is not hade to solve than the intege factoization poblem, because factoing the RSA modulus leads to computing the pivate exponent d, and to solving the RSA poblem. Howeve, it is not clea, if the convese is tue. In the RSA cyptosystem, the public modulus = pq is a poduct of two pimes of the same bit size. The public and pivate exponent e and d satisfy the conguence ed (mod ϕ()), whee ϕ() = (p )(q ) is the Eule totient function [,2]. Received July 8, 206; Accepted Septembe 7, 206 * Coesponding autho addess: ezal@upm.edu.my (Muhammad Rezal Kamel ARIFFI)

2 ew finding on factoing pime powe RSA modulus = p q 405 In 990, Wiene showed that RSA is insecue if d < (see [3]). Late based on the lattice basis eduction, Boneh and Dufee impoved the bound to d < (see [4]). The numbe of exponents fo which thei attack applies can be estimated as ε. Wiene s attack as well as its genealization by Boneh and Dufee is based on the RSA key equation ed kϕ() = whee k is a positive intege. In 2004, Blome and May combined both Wiene method with Boneh and Dufee method to show that RSA is insecue if the public exponent e satisfies an equation ex kϕ() = y (see [5]). Applying the continued faction algoithm and Coppesmith s method [6], they showed that the RSA modulus can be factoed in polynomial time if the paametes x and y satisfy x < 3 4 and y 3 4 ex. Additionally, Blome and May poved that the numbe of such weak exponents is at least 3 4 ε (see [7,8,2]). Many RSA vaiants have been poposed in ode to ensue computational efficiency while maintaining the acceptable levels of secuity. One such impotant vaiant is the pime powe RSA. In pime powe RSA the modulus is in the fom = p q fo 2. In 998, Takagi showed how to use the pime powe RSA to speed up the decyption pocess when the public and pivate exponents satisfy an equation ed (mod (p )(q )) (see [9]). As in the standad RSA cyptosystem, the secuity of the pime powe RSA depends on the difficulty of factoing integes of the fom = p q (see [0 2]). Containing the discussion of vaiants of RSA moduli by manipulating k instances of RSA moduli and public key pai ( i, e i ) via thei k equations. In 2007, Hinek, showed that it is possible to facto the k modulus i using k equations of the fom e i d k i ϕ( i ) = if d < δ k with δ = 2(k+) ε whee ε is a small constant depending on the size of max i (see [3]). Vey ecently in 204, with k RSA public keys ( i, e i ), itaj, et al. pesented a method that factos the k RSA moduli i using k equations of the shape e i x y i ϕ( i ) = z i o of the shape e i x i yϕ( i ) = z i whee i = p i q i, ϕ( i ) = (p i )(q i ) and the paametes x, x i, y, y i, z i ae suitably small in tems of the pime factos of the moduli [4]. Ou contibution, as motivated fom the ecent esult of [4] and [2]. This pape poposes thee new attacks on the Pime Powe RSA with a modulus = p q. In the fist attack, we conside an instance of the pime powe RSA with modulus = p q and public of exponent e satisfying the equation ex Y + (ap + bq )Y = Z fo suitable positive integes a, b. Using continued faction we show that Y X can be ecoveed among the convegents of the continued faction expansion of e 2. We show that the numbe of such exponents is at least (+) ε whee ε 0 is abitaily small fo lage. Hence one can facto the modulus = p q in polynomial time. Fo k 2, 2, let i = p i q i, i =,..., k. The second attack woks when k instances ( i, e i ) ae such that thee exist an intege x, k integes y i, and k integes z i satisfying e i x i y i + (ap i + bq i )y i = z i. We show that the k RSA moduli i can be factoed in polynomial

3 406 Sadiq SHEHU and Muhammad Rezal Kamel ARIFFI time if = min i i and x < δ, y i < δ, z i < ap i bq i 3(ap i + bq i ) 2 y i whee δ = k k2 αk 2 2. ( + k) In the thid attack we show that the k RSA moduli i can be factoed in polynomial time, when the k instance ( i, e i ) of RSA ae such that thee exist an intege y, and k integes x i and k integes z i satisfying e i x i i y + (ap i + bq i )y = z i with min i = min i i, e i = β and x i < δ, y < δ, z i < ap i bq i 3(ap i + bq i ) 2 y i whee δ = βk2 αk 2 k 2. ( + k) Fo the second and thid attack we tansfom the equations into simultaneous diophantine poblem and apply lattice basis eduction techniques to find the paametes (x, y i ) o (y, x i ) which leads to factoization of k RSA moduli i. The est of the pape is stuctued as follows. In Section 2, we give a bief eview of basic facts about the continued faction, lattice basis eduction and simultaneous diophantine appoximations with some useful esults needed fo the attack. In Section 3, we popose the fist attack with estimation of the numbe of exponents fo which ou attack woks. In Sections 4 and 5, we give the second and thid attack. We conclude this pape in Section Peliminaies We stat with definition and an impotant esult concening the continued faction, lattice basis eduction techniques and simultaneous diophantine equations as well as some useful lemmas needed fo the attacks. 2.. Continued faction Definition 2. (Continued faction) The continued faction of a eal numbe R is an expession of the fom R = a 0 + a + a 2 + a 3 + whee a 0 Z and a i 0 fo i. The numbes a 0, a, a 2,... ae called the patial quotients. We use the notation R = [a 0, a, a 2,...]. Fo i the ational i s i = [a 0, a, a 2,...] ae called the convegents of the continued faction expansion of R. If R = a b is a ational numbe such that gcd(a, b) =, then the continued faction expansion is finite. Hady and Wight (965) (see [5]). Let x = [a 0, a, a 2,..., a m ] be a continued faction expansion of x. If X and Y ae copime integes such that x Y < X 2X 2. Then Y = p n and X = q n fo some convegent p n qn of x with n Lattice

4 ew finding on factoing pime powe RSA modulus = p q 407 A lattice is a discete (additive) subgoup of R n. Equivalently, given m n linealy independent vectos b,..., b m R n, the set { m } L = L(b,..., b m ) = α i b i α i Z is a lattice. The b i ae called basis vectos of L and B = b,..., b m is called a lattice basis fo L. Thus, the lattice geneated by a basis B is the set of all intege linea combinations of the basis vectos in B. The dimension (o ank) of a lattice, denoted dim(l), is equal to the numbe of vectos making up the basis. The dimension of a lattice is equal to the dimension of the vecto subspace spanned by B. A lattice is said to be full dimensional (o full ank) when dim(l) = n (see [2]). A lattice L can be epesented by a basis matix. Given a basis B, a basis matix M fo the lattice geneated by B is the m n matix defined by the ows of the set b,..., b m b M =.. It is often useful to epesent the matix M by B. A vey impotant notion fo the lattice L is the deteminant. as b m Let L be a lattice geneated by the basis B = b,..., b m. The deteminant of L is defined det(l) = i= det(bb T ). If n = m, we have det(l) = det(bb T ) = det(b). Lensta et al. (982) (see [6]). Let L be a lattice of dimension ω with a basis v,..., v ω. The LLL algoithm poduces a educed basis b,..., b ω satisfying fo all i ω. b b 2 b i 2 ω(ω ) 4(ω+ i) detl ω+ i An application of the LLL algoithm is that it povides a solution to the simultaneous diophantine appoximations poblem which is defined as follows. Let α,..., α n be n eal numbes and ε a eal numbe such that 0 < ε <. A classical theoem of Diichlet assets that thee exist integes p,..., p n and a positive intege q ε n such that qα i p i < ε fo i n. A method to find simultaneous diophantine appoximations to ational numbes was descibed by [6]. In thei wok, they consideed a lattice with eal enties. The following is a simila esult fo a lattice with intege enties. Theoem 2.2 (Simultaneous diophantine appoximations) ([4]) Thee is a polynomial time algoithm, fo given ational numbes α,..., α n and 0 < ε <, to compute integes p,..., p n

5 408 Sadiq SHEHU and Muhammad Rezal Kamel ARIFFI and a positive intege q such that Poof See [4] Appendix A. max qα i p i < ε and q 2 n(n 3) 4. i Lemma 2.3 Let = p q be an RSA modulus pime powe with q < p < 2q. Then < q < + < p < Poof Suppose = p q. Then multiplying q < p < 2q by p, we get p q < p p < 2p q which implies < p + < 2, that is + < p < Also since = p q, q = p which in tun implies 2 Lemma < q < +, we have < q < + < p < Let = p q be an RSA modulus pime powe with q < p < 2q. Let a, b be suitably small integes with gcd(a, b) =. Let ap bq <. Let S be an appoximation of ap + bq such that Then abq = [ S2 4 ]. ap + bq S < ap bq 3(ap + bq ) 2. Poof Set S = ap + bq + k with k < ap bq 3(ap +bq ) 2. Obseve that (ap bq ) 2 = (ap bq )(ap bq ) = (ap + bq ) 2 4abq p = (ap + bq ) 2 4abq. Theefoe, we obtain (ap bq ) 2 = (ap + bq ) 2 4abq. () ow we conside S 2 4abq = (ap + bq + k) 2 4abq Theefoe using () above, we can ewite = a 2 p 2 + 2abq p + 2akp + b 2 q 2 + 2bkq 4abq = a 2 p 2 + 2abq p + b 2 q 2 + 2k(ap + bq ) + k 2 4abq = (ap + bq ) 2 4abq + 2k(ap + bq ) + k 2. S 2 4abq = (ap bq ) 2 + 2k(ap + bq ) + k 2. (2) Suppose that ap bq < and k < ap bq 3(ap +bq ) 2 < 2. Then, fom (2), we have S 2 4abq = (ap bq ) 2 + 2k(ap + bq ) + k 2 < ( ) 2 + 2(ap + bq ) ap bq 3(ap + bq ) 2 + ( 2 ) 2 < ap bq 2 + ( 2 ) 2 <

6 ew finding on factoing pime powe RSA modulus = p q 409 < < 2. Thus we have S 2 4abq < 2. When dividing by 4, we obtain which implies that abq = [ S2 4 ]. S2 4 abq = S2 4abq < = 2 3. The fist attack on pime powe RSA with moduli = p q Let (, e) be a public key satisfying an equation ex Y + (ap + bq )Y = Z with small paametes X, Y and Z whee a, b ae suitably small positive integes. In this section, we pesent a esult based on continued factions and show how to facto the Pime Powe RSA modulus. Lemma 3. Let = p q be an RSA modulus pime powe with q < p < 2q. Let a, b be suitably small integes with gcd(a, b) =. Let e be a public key exponent satisfying the equation ex Y + (ap + bq )Y = Z with gcd(x, Y ) =, if Y X < 2 Z < ap bq e. 3(ap +bq ) 2. Then Y X 2(ap +bq ) 2 and is among the convegent of the continued faction expansion of Poof Assume that Z < ap bq 3(ap +bq ) 2 Y, thus Z < ap bq Y. Hence fom the equation we get e Y = X ex Y + (ap + bq )Y = Z, ex Y X < Z + (ap + bq )Y X (ap + bq )Y X 2(ap + bq )Y X = 2(ap + bq ). = Z (ap + bq )Y X Z X + (ap + bq )Y X + (ap + bq )Y X 2(ap + bq )X X Theefoe, if the condition 2(ap +bq ) < 2X holds, then fom the theoem of the continued 2 faction, Y X is one of the convegents of the continued faction of e. This is equivalent to Theoem 3.2 2(ap + bq ) < 2X 2, 4X2 (ap + bq ) <, X 2 < 4(ap + bq ), X < 2. 2(ap + bq ) 2 Let = p q be an RSA modulus pime powe with q < p < 2q. Let a, b be suitably small integes with gcd(a, b) =. Suppose that e is a public key exponent satisfying the

7 40 Sadiq SHEHU and Muhammad Rezal Kamel ARIFFI equation ex Y + (ap + bq )Y = Z with gcd(x, Y ) =, if Y X < 2 Z < ap bq 3(ap +bq ) 2 Y, then can be factoed in polynomial time. 2(ap +bq ) 2 and Poof Suppose that the public key e satisfies an equation ex Y + (ap + bq )Y = Z with gcd(x, Y ) =. Let Y X < 2 2(ap +bq ) 2 and Z < ap bq 3(ap +bq ) 2 Y satisfy the condition of Lemma 3. above. Then Y X is one of the convegents of the continued faction of e. Let us ewite equation ex Y + (ap + bq )Y = Z as This implies ex Y + (ap + bq ) = Z Y, (ap + bq ) + ex Y = Z Y. (ap + bq ) ( ex Y ) = Z Y. We define S = ex Y, theefoe by Lemma 2.4, S is an appoximation of ap + bq satisfying ap + bq S (ap + bq ) ( ex Y ) = Z Y ap bq 3(ap + bq )Y 2 Y < ap bq 3(ap + bq ) 2, which, by Lemma 2.4, implies that abq = [ S2 4 ], fo value of S = ex Y that q = gcd([ S2 4 ], ).. Theefoe, it follows Example 3.3 The following shows an illustation of ou attack fo = 3, given and e as = , e = Suppose that the public key (e, ) satisfies = p q, q < p < 2q and ex Y +(ap +bq )Y = Z fo small paametes X, Y, Z as stated in the Theoem. Following the above algoithm, we fist e compute the continued faction expansion of. The list of fist convegents of the continued e faction expansion of ae [ 3 0,, 4, 4 5, 7 9, 4, 29 37, 40 5, , , , , , , ,... ]. Theefoe omitting the fist and second enty and stating with the convegent 3 4, we obtain S = ex Y = , 3 [ S 2 ] = Hence gcd([ S2 4 ], ) = ( , ) =. the factoization algoithm with the convegent 40 5, we obtain S = ex Y = , 40 [ S 2 ] = Theefoe applying We compute gcd([ S2 4 ], ) = ( , ) = Finally with q = 6993, we compute p = 3 q = 8005, which leads to the factoization of.

8 ew finding on factoing pime powe RSA modulus = p q 4 Algoithm Input: A public key (e, ) satisfying = p q, q < p < 2q and ex Y + (ap + bq )Y = Z fo small paametes X, Y, Z Output: The pime factos p and q. : Compute the continued faction expansion of e. 2: Fo evey convegent Y X of e, compute S = ex Y. 3: Compute [ S2 4 ]. 4: Compute q = gcd([ S2 4 ], ). 5: If < q <, then p = q. 6: End if. 7: End fo. 3.. Estimation of the weak exponent Lemma 3.4 Let = p q be an RSA modulus pime powe with q < p < 2q. Let a, b be suitably small integes with gcd(a, b) = and ap bq <. Suppose that e is a public key exponent satisfying the two equations ex Y + (ap + bq )Y = Z, ex Y + (ap + bq )Y = Z with gcd(x, Y ) = = gcd(x, Y ), Y X < 2 Then X = X, Y = Y and Z = Z. 2(ap +bq ) 2 and Z, Z < ap bq 3(ap +bq ) 2 Y. Poof Suppose that e satisfies the two equations ex Y + (ap + bq )Y = Z, ex Y + (ap + bq )Y = Z with Y X < 2 2(ap +bq ) 2 and Z, Z < ap bq 3(ap +bq ) 2 Y. Then, fom ex Y + (ap + bq )Y = Z, we have e = Y + Z (ap + bq )Y X Also fom ex Y + (ap + bq )Y = Z, we get Equating the tem e yields e = Y + Z (ap + bq )Y X. Y + Z (ap + bq )Y X = Y + Z (ap + bq )Y X, Y X + ZX (ap + bq )Y X = Y X + Z X (ap + bq )Y X, (ap + bq )(Y X Y X ) + ZX Z X = (Y X Y X ). (3). ext we assume that X, X < 2 2(ap +bq ) 2 and Z, Z < ap bq 3(ap +bq ) 2 Y. Then the left hand

9 42 Sadiq SHEHU and Muhammad Rezal Kamel ARIFFI side of (3) becomes (ap + bq )(Y X Y X ) + ZX Z X < (ap + bq ) (Y X Y X ) + ZX Z X < (ap + bq )( Y X + Y X ) + ZX + Z X < (ap + bq 2 ) 2(ap + bq ) + 6(ap + bq ) < < (ap + bq ) 2 < (ap + bq ) 2 Hence fom the ight hand side of (3) we deduce that Y X Y X = 0. Since gcd(x, Y ) = gcd(x, Y ) =, it follows that X = X, Y = Y and Z = Z. Theoem 3.5 Let = p q be an RSA modulus pime powe with q < p < 2q. Let a, b be suitably small integes with gcd(a, b) =. Suppose that e < is a public key exponent satisfying the equation ex Y + (ap + bq )Y = Z with gcd(x, Y ) =, Y X < 2 and Z, Z < ap bq 2(ap +bq ) 2 3(ap +bq ) 2 Y is at least 2 (+) ε whee ε > 0 is abitaily small fo suitably lage. Poof Suppose that the exponent e satisfies an equation with gcd(x, Y ) = and Y X < 2 numbe of the exponent e satisfying ex Y + (ap + bq )Y = Z 2(ap +bq ) 2 e Z (ap + bq )Y X With the condition given in the theoem, we have ξ = ω Y Y = X= Z = gcd(x,y )=, Z, Z < ap bq 3(ap +bq ) 2 Y. Let ξ denote the mod. ω 2 whee ω = 2 and ω 2(ap +bq ) 2 2 = ap bq 3(ap +bq ) 2. Obseve that ω 2 Z = Substituting (5) into (4), we get, (4) = 2ω 2 > ap bq 3(ap + bq ) 2 > 2 3(ap + bq ) > +. (5) ξ > + ω X X= Y = gcd(x,y )=. (6)

10 ew finding on factoing pime powe RSA modulus = p q 43 Also by consideing the following identity fo < Y <, we have [5, Theoem 328] Y X= gcd(x,y )= = ϕ(y ) > CY log log Y > whee c is a positive constant. Substituting (7) into (6), we get Then fo ω Y = Y, we have ω Substituting into (8) gives Y = ξ > + C log log Y = ω (ω + ) 2 > ω Y = 8(ap + bq ). ξ > C + log log 8(ap + bq ), CY log log, (7) Y. (8) C ξ > 8 log log + (ap + bq ). (9) ext we assume that ap + bq < 2ap, then using the esult fom Lemma 2.3, we have (ap + bq ) < (2ap ) < (2a(2 + + ) ) < 2a(2 + + ). Substituting the above esult into (0), we get +2 (+) C ξ > 6 log log + C a2 = log log a2 C = +2 C 6a2 (+) = 2 + log log 6a2 + log log = 2 (+) ε, + + (+) whee we set ε = C 6a2 + log log and ε > 0 is abitaily small fo lage. 4. The second attack on k pime powe RSA with moduli i = p i q i Suppose that the pime powe RSA moduli i = p i q i with the same size, satisfies the k equations of the fom e i x i y i + (ap i + bq i )y i = z i. In this section fo k 2, 2 we show that it is possible to facto the RSA moduli i if the unknown paametes x, y i, and z i ae suitably small. Theoem 4. Fo k 2, 2, let i = p i q i, i k be k RSA moduli. Let = min i i. Let e i, i =,..., k, be k public exponents. Define δ = k k2 αk 2 2 (+k). Let a, b be suitably small integes with gcd(a, b) = such that ap i + bq i < + +α. If thee exist an intege x < δ and k integes y i < δ and z i < ap i bq i 3(ap ) i +bq 2 y i such that e i x i y i + (ap i + bq i )y i = z i fo i i =,..., k, then one can facto the k RSA moduli,..., k in polynomial time. Poof Fo k 2, and 2, let i = p i q i, i k be k RSA moduli. Let = min i i and

11 44 Sadiq SHEHU and Muhammad Rezal Kamel ARIFFI suppose that y i < δ and ap i +bq i < + +α. Then the equation e i x i y i +(ap i +bq i )y i = z i can be ewitten as e i i x y i = z i (ap i + bq i )y i i. (0) Let = min i i, and suppose that y i < δ, z i < 2 y i and ap i + bq i < + +α. Then z i (ap i + bq i )y i z i + (ap i + bq i )y i < 2 i < 2 +δ + δ+ + +α δ + + +α δ < 2 2 +δ+α < 2 2 +δ+α 2 δ+α < 2 2. Substituting into () gives e i x y i < 2 δ+α 2 2. i 2 δ+α Hence to show the existence of the intege x, we let ε = 2 2 with δ = k k2 αk 2. Then we have δ ε k = 2 k k k2 δ+δk+αk 2 2 (+k) = 2 k. Theefoe since 2 k < 2 k(k 3) 4 3 k fo k 2, we get δ ε k < 2 k(k 3) 4 3 k. It follows that if x < δ, then x < 2 k(k 3) 4 3 k ε k. Summaizing fo i =,..., k, we have e i i x y i < ε, x < 2 k(k 3) 4 3 k ε k. Hence it satisfies the conditions of [9], and we can obtain x and y i fo i =,..., k. ext fom the equation e i x i y i = z i (ap i + bq i )y i, we get (ap i + bq i ) ( i e ix y i ) = z i y i. Since z i < 2 y i and S i = i eix y i is an appoximation of ap i + bq i with an eo tem of at most 2, using Lemma 2.4 implies that abq i = [ S2 i 4 i ] with S i = i e ix y i. Fo i =,..., k, we compute q i = gcd( i, [ S2 i 4 i ]), which leads to factoization of k RSA moduli i,..., k. Example 4.2 As an illustation to ou second attack on k pime powe RSA, we conside the following thee RSA pime powe and thee public exponents = , 2 = , 3 = , e = , e 2 = , e 3 = Then = max(, 2, 3 ) = Since k = 3 and = 3 with α < 3, we get δ = k k2 αk 2 2 (+k) = and ε = Using [4, Eq. ()], with n = k = 3, we obtain C = [3 n+ 2 (n+)(n 4) 4 ε n ] = δ+α 2 =

12 ew finding on factoing pime powe RSA modulus = p q 45 Conside the lattice L spanned by the matix [Ce / ] [Ce 2 / 2 ] [Ce 3 / 3 ] M = 0 C C C Theefoe applying the LLL algoithm to L, we obtain the educed basis with following matix K = ext we compute K M = Then fom the fist ow we obtain x = , y = 4437, y 2 = , y 3 = Hence, using x and y i fo i =, 2, 3, and defining S i = i eix y i, we get and Lemma 2.4 implies that abq i S = , S 2 = , S 3 = = [ S2 i 4 i ] fo i =, 2, 3, which gives [ S 2 4 ] = , [ S ] = , [ S ] = Theefoe fo i =, 2, 3, we compute q i = gcd([ S2 i 4 i ], i ), that is q = , q 2 = , q 3 = Finally fo i =, 2, 3, we find p i = 3 i q i, hence p = , p 2 = , p 3 = which leads to the factoization of thee RSA moduli, 2 and The thid attack on k pime powe RSA with moduli i = p i q i In this section, we conside the scenaio when the k RSA moduli i = p i q fo k 2, and 2 satisfy k equations e i x i i y + (ap i + bq i )y = z i fo i =,..., k, with suitably small unknown paametes x i, y and z i.

13 46 Sadiq SHEHU and Muhammad Rezal Kamel ARIFFI Theoem 5. Fo k 2, and 2 let i = p i q i, i k be k RSA moduli with the same size. Let e i, i =,..., k, be k public exponents with min i, e i = β. Let δ = βk2 αk 2 k 2 (+k). Let a, b be suitably small integes with gcd(a, b) = such that ap i + bq i < + +α. If thee exist an intege y < δ and k integes x i < δ such that e i x i i y + (ap i + bq i )y = z i fo i =,..., k, then one can facto the k RSA moduli,..., k in polynomial time. Poof Fo k 2, and 2, let i = p i q i, i k be k RSA moduli. Then the equation e i x i i y + (ap i + bq i )y = z i can be ewitten as i e i y x i = z i (ap i + bq i )y e i. () Let = max i i, z i < 2 y i and suppose that y < δ, min i, e i = β and ap i + bq i < + +α. Then z i (ap i + bq i )y e i z i + (ap i + bq i )y β = 2 +δ + δ+ β + +α < 2 < 2 δ + + +α δ β 2 +δ+α β < 2 2 +δ+α β. (2) Substituting into (2) yields i e i y x i < 2 2 +δ+α β. Hence to show the existence of the intege y and integes x i, we let ε = 2 2 +δ+α β, with δ = βk2 αk 2 k. Then we have δ ε k = 2 k δ+δk+ k 2 +αk βk = 2 k. 2 (+k) Theefoe since 2 k < 2 k(k 3) 4 3 k fo k 2, we get δ ε k < 2 k(k 3) 4 3 k. It follows that if y < δ, then y < 2 k(k 3) 4 3 k ε k. Summaizing fo i =,..., k, we have i e i y x i < ε, y < 2 k(k 3) 4 3 k ε k. Hence it satisfies the conditions of [4], and we can obtain y and x i fo i =,..., k. ext fom the equation e i x i i y = z i (ap i + bq i )y, we get (ap i + bq i ) ( i e ix i y ) = z i y. Since S i = i eixi y is an appoximation of ap i + bq i with an eo tem of at most 2, using Lemma 2.4 implies that abq i = [ S2 i 4 i ] with S i = i e ix i y. Fo i =,..., k, we compute q i = gcd( i, [ S2 i 4 i ]), which leads to factoization of k RSA moduli i,..., k. Example 5.2 As an illustation to ou thid attack on k pime powe RSA, we conside the following thee RSA pime powe and thee public exponents = , 2 = , 3 = , e = ,

14 ew finding on factoing pime powe RSA modulus = p q 47 e 2 = , e 3 = Then = max(, 2, 3 ) = Also min(e, e 2, e 3 ) = β with β = Since k = 3 and = 3 with α < 3, we get δ = βk 2 αk 2 k 2 (+k) = and ε = 2 2 +δ+α β = Using [4, Eq. ()], with n = k = 3, we obtain C = [3 n+ 2 (n+)(n 4) 4 ε n ] = Conside the lattice L spanned by the matix [C /e ] [C 2 /e 2 ] [C 3 /e 3 ] M = 0 C C C Theefoe applying the LLL algoithm to L, we obtain the educed basis with following matix M = ext we compute K M = Then fom the fist ow we obtain y = , x = 2973, x 2 = 3457, x 3 = Hence, by using x and y i fo i =, 2, 3, and defining S i = i e ix i y, we get and Lemma 2.4 implies that abq i S = , S 2 = , S 3 = = [ S2 i 4 i ] fo i =, 2, 3, which gives [ S 2 4 ] = , [ S ] = , [ S ] = Theefoe fo i =, 2, 3 we compute q i = gcd([ S2 i 4 i ], i ), that is q = , q 2 = , q 3 =

15 48 Sadiq SHEHU and Muhammad Rezal Kamel ARIFFI and finally fo i =, 2, 3, we find p i = 3 i q i, hence p = , p 2 = , p 3 = which leads to the factoization of thee RSA moduli, 2 and Conclusion This pape shows thee new attacks on RSA-type modulus of = p q fo 2 and q < p < 2q. Fo the fist attack, using continued faction we show that Y X can be ecoveed e among the convegents of the continued faction expansion of. Futhemoe we show that the set of such weak exponents is elatively lage, namely that thei numbe is at least 2 (+) ε whee ε 0 is abitaily small fo suitably lage. Hence one can facto the pime powe RSA modulus = p q in polynomial time. Fo k 2, 2, we pesent second and thid attacks on the pime powe RSA with moduli i = p i q i fo i =,..., k. The attacks wok when k RSA public keys ( i, e i ) ae such that thee exist k elations of the shape e i x i y i +(ap i +bq i )y i = z i o of the shape e i x i i y + (ap i + bq i )y = z i whee the paametes x, x i, y, y i, z i ae suitably small in tems of the pime factos of the moduli. Applying LLL algoithm, we show that ou appoach enables us to simultaneously facto the k pime powe RSA moduli i. Refeences [] A. ITAJ. Diophantine and Lattice Cyptanalysis of the RSA Cyptosystem. Atificial Intelligence, Evolutionay Computing and Metaheuistics. Spinge Belin Heidelbeg, 203. [2] A. ITAJ. A new vulneable class of exponents in RSA. JP J. Algeba umbe Theoy Appl., 20, 2(2): [3] M. WIEER. Cyptanalysis of shot RSA secet exponents. IEEE Tans. Infom. Theoy, 990, 36(3): [4] D. BOEH, G. DURFEE. Cyptanalysis of RSA with Pivate Key d Less than Spinge, Belin, 999. [5] J. BLOMER, A. MAY. A genealized Wiene Attack on RSA. Spinge, Belin, [6] R. RIVEST, A. SHAMIR, L. ADLEMA. A method fo obtaining digital signatues and public-key cyptosystems. Comm. ACM, 978, 2(2): [7]. HOWGRAVE-GRAHAM, J. P. SEIFERT. Extending Wienes Attack in the Pesence of Many Decypting Exponents. Spinge-Velag, 999. [8] A. ITAJ. Cyptanalysis of RSA Using the Ratio of the Pimes. Spinge, Belin, [9] T. TAKAGI. Fast RSA-Type Cyptosystem Modulo p k q. Spinge, Belin, 998. [0] S. SARKAR. Small secet exponent attack on RSA vaiant with modulus = p q. Des. Codes Cyptog., 204, 73(2): [] A. MAY. ew RSA Vulneabilities Using Lattice Reduction Methods. Ph.D. Thesis, Univesity of Padebon, [2] M. J. HIEK. Lattice attacks in cyptogaphy: A patial oveview. School of Compute Science, Univesity of Wateloo, Canada, [3] J. HIEK. On the Secuity of Some Vaiants of RSA. Ph.D. Thesis, Wateloo, Ontaio, Canada, [4] A. ITAJ, M. R. K. ARIFFI, D. I. ASSR, et al. ew Attacks on the RSA Cyptosystem. Spinge, Cham, 204. [5] G. H. HARDY, E. M. WRIGHT. An Intoduction to the Theoy of umbes. Oxfod Univesity Pess, London, 965. [6] A. K. LESTRA, H. W. LESTRA, L. LOVASZ. Factoing polynomials with ational coefficients. Math. Ann., 982, 26(4):

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de

More information

Chapter 3: Theory of Modular Arithmetic 38

Chapter 3: Theory of Modular Arithmetic 38 Chapte 3: Theoy of Modula Aithmetic 38 Section D Chinese Remainde Theoem By the end of this section you will be able to pove the Chinese Remainde Theoem apply this theoem to solve simultaneous linea conguences

More information

Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference

Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference Impoved Factoing Attacks on Multi-Pime RSA with Small Pime Diffeence Mengce Zheng 1,2, Nobou Kunihio 2, and Honggang Hu 1 1 Univesity of Science and Technology of China, China mengce.zheng@gmail.com 2

More information

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013 AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the

More information

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity Constuction and Analysis of Boolean Functions of 2t + 1 Vaiables with Maximum Algebaic Immunity Na Li and Wen-Feng Qi Depatment of Applied Mathematics, Zhengzhou Infomation Engineeing Univesity, Zhengzhou,

More information

ONE-POINT CODES USING PLACES OF HIGHER DEGREE

ONE-POINT CODES USING PLACES OF HIGHER DEGREE ONE-POINT CODES USING PLACES OF HIGHER DEGREE GRETCHEN L. MATTHEWS AND TODD W. MICHEL DEPARTMENT OF MATHEMATICAL SCIENCES CLEMSON UNIVERSITY CLEMSON, SC 29634-0975 U.S.A. E-MAIL: GMATTHE@CLEMSON.EDU, TMICHEL@CLEMSON.EDU

More information

arxiv: v1 [math.nt] 28 Oct 2017

arxiv: v1 [math.nt] 28 Oct 2017 ON th COEFFICIENT OF DIVISORS OF x n axiv:70049v [mathnt] 28 Oct 207 SAI TEJA SOMU Abstact Let,n be two natual numbes and let H(,n denote the maximal absolute value of th coefficient of divisos of x n

More information

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic.

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic. Chapte 9 Pimitive Roots 9.1 The multiplicative goup of a finite fld Theoem 9.1. The multiplicative goup F of a finite fld is cyclic. Remak: In paticula, if p is a pime then (Z/p) is cyclic. In fact, this

More information

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

Enumerating permutation polynomials

Enumerating permutation polynomials Enumeating pemutation polynomials Theodoulos Gaefalakis a,1, Giogos Kapetanakis a,, a Depatment of Mathematics and Applied Mathematics, Univesity of Cete, 70013 Heaklion, Geece Abstact We conside thoblem

More information

New problems in universal algebraic geometry illustrated by boolean equations

New problems in universal algebraic geometry illustrated by boolean equations New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic

More information

The Congestion of n-cube Layout on a Rectangular Grid S.L. Bezrukov J.D. Chavez y L.H. Harper z M. Rottger U.-P. Schroeder Abstract We consider the pr

The Congestion of n-cube Layout on a Rectangular Grid S.L. Bezrukov J.D. Chavez y L.H. Harper z M. Rottger U.-P. Schroeder Abstract We consider the pr The Congestion of n-cube Layout on a Rectangula Gid S.L. Bezukov J.D. Chavez y L.H. Hape z M. Rottge U.-P. Schoede Abstact We conside the poblem of embedding the n-dimensional cube into a ectangula gid

More information

SOME GENERAL NUMERICAL RADIUS INEQUALITIES FOR THE OFF-DIAGONAL PARTS OF 2 2 OPERATOR MATRICES

SOME GENERAL NUMERICAL RADIUS INEQUALITIES FOR THE OFF-DIAGONAL PARTS OF 2 2 OPERATOR MATRICES italian jounal of pue and applied mathematics n. 35 015 (433 44) 433 SOME GENERAL NUMERICAL RADIUS INEQUALITIES FOR THE OFF-DIAGONAL PARTS OF OPERATOR MATRICES Watheq Bani-Domi Depatment of Mathematics

More information

10/04/18. P [P(x)] 1 negl(n).

10/04/18. P [P(x)] 1 negl(n). Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the

More information

ON SPARSELY SCHEMMEL TOTIENT NUMBERS. Colin Defant 1 Department of Mathematics, University of Florida, Gainesville, Florida

ON SPARSELY SCHEMMEL TOTIENT NUMBERS. Colin Defant 1 Department of Mathematics, University of Florida, Gainesville, Florida #A8 INTEGERS 5 (205) ON SPARSEL SCHEMMEL TOTIENT NUMBERS Colin Defant Depatment of Mathematics, Univesity of Floida, Gainesville, Floida cdefant@ufl.edu Received: 7/30/4, Revised: 2/23/4, Accepted: 4/26/5,

More information

Introduction Common Divisors. Discrete Mathematics Andrei Bulatov

Introduction Common Divisors. Discrete Mathematics Andrei Bulatov Intoduction Common Divisos Discete Mathematics Andei Bulatov Discete Mathematics Common Divisos 3- Pevious Lectue Integes Division, popeties of divisibility The division algoithm Repesentation of numbes

More information

QIP Course 10: Quantum Factorization Algorithm (Part 3)

QIP Course 10: Quantum Factorization Algorithm (Part 3) QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse

More information

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES AGU Intenational Jounal of Science and Technology A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES Ritu Ahuja Depatment of Mathematics Khalsa College fo Women, Civil Lines, Ludhiana-141001, Punjab, (India)

More information

Chaos and bifurcation of discontinuous dynamical systems with piecewise constant arguments

Chaos and bifurcation of discontinuous dynamical systems with piecewise constant arguments Malaya Jounal of Matematik ()(22) 4 8 Chaos and bifucation of discontinuous dynamical systems with piecewise constant aguments A.M.A. El-Sayed, a, and S. M. Salman b a Faculty of Science, Aleandia Univesity,

More information

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the

More information

NOTE. Some New Bounds for Cover-Free Families

NOTE. Some New Bounds for Cover-Free Families Jounal of Combinatoial Theoy, Seies A 90, 224234 (2000) doi:10.1006jcta.1999.3036, available online at http:.idealibay.com on NOTE Some Ne Bounds fo Cove-Fee Families D. R. Stinson 1 and R. Wei Depatment

More information

Method for Approximating Irrational Numbers

Method for Approximating Irrational Numbers Method fo Appoximating Iational Numbes Eic Reichwein Depatment of Physics Univesity of Califonia, Santa Cuz June 6, 0 Abstact I will put foth an algoithm fo poducing inceasingly accuate ational appoximations

More information

QUANTUM ALGORITHMS IN ALGEBRAIC NUMBER THEORY

QUANTUM ALGORITHMS IN ALGEBRAIC NUMBER THEORY QUANTU ALGORITHS IN ALGEBRAIC NUBER THEORY SION RUBINSTEIN-SALZEDO Abstact. In this aticle, we discuss some quantum algoithms fo detemining the goup of units and the ideal class goup of a numbe field.

More information

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22 C/CS/Phys C9 Sho s ode (peiod) finding algoithm and factoing /2/4 Fall 204 Lectue 22 With a fast algoithm fo the uantum Fouie Tansfom in hand, it is clea that many useful applications should be possible.

More information

arxiv: v1 [math.co] 1 Apr 2011

arxiv: v1 [math.co] 1 Apr 2011 Weight enumeation of codes fom finite spaces Relinde Juius Octobe 23, 2018 axiv:1104.0172v1 [math.co] 1 Ap 2011 Abstact We study the genealized and extended weight enumeato of the - ay Simplex code and

More information

Gradient-based Neural Network for Online Solution of Lyapunov Matrix Equation with Li Activation Function

Gradient-based Neural Network for Online Solution of Lyapunov Matrix Equation with Li Activation Function Intenational Confeence on Infomation echnology and Management Innovation (ICIMI 05) Gadient-based Neual Netwok fo Online Solution of Lyapunov Matix Equation with Li Activation unction Shiheng Wang, Shidong

More information

Journal of Inequalities in Pure and Applied Mathematics

Journal of Inequalities in Pure and Applied Mathematics Jounal of Inequalities in Pue and Applied Mathematics COEFFICIENT INEQUALITY FOR A FUNCTION WHOSE DERIVATIVE HAS A POSITIVE REAL PART S. ABRAMOVICH, M. KLARIČIĆ BAKULA AND S. BANIĆ Depatment of Mathematics

More information

SOME SOLVABILITY THEOREMS FOR NONLINEAR EQUATIONS

SOME SOLVABILITY THEOREMS FOR NONLINEAR EQUATIONS Fixed Point Theoy, Volume 5, No. 1, 2004, 71-80 http://www.math.ubbcluj.o/ nodeacj/sfptcj.htm SOME SOLVABILITY THEOREMS FOR NONLINEAR EQUATIONS G. ISAC 1 AND C. AVRAMESCU 2 1 Depatment of Mathematics Royal

More information

Multiple Criteria Secretary Problem: A New Approach

Multiple Criteria Secretary Problem: A New Approach J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and

More information

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu Available at https://edupediapublicationsog/jounals Volume 3 Issue 4 Febuay 216 Using Laplace Tansfom to Evaluate Impope Integals Chii-Huei Yu Depatment of Infomation Technology, Nan Jeon Univesity of

More information

Semicanonical basis generators of the cluster algebra of type A (1)

Semicanonical basis generators of the cluster algebra of type A (1) Semicanonical basis geneatos of the cluste algeba of type A (1 1 Andei Zelevinsky Depatment of Mathematics Notheasten Univesity, Boston, USA andei@neu.edu Submitted: Jul 7, 006; Accepted: Dec 3, 006; Published:

More information

Application of Parseval s Theorem on Evaluating Some Definite Integrals

Application of Parseval s Theorem on Evaluating Some Definite Integrals Tukish Jounal of Analysis and Numbe Theoy, 4, Vol., No., -5 Available online at http://pubs.sciepub.com/tjant/// Science and Education Publishing DOI:.69/tjant--- Application of Paseval s Theoem on Evaluating

More information

arxiv: v1 [math.co] 6 Mar 2008

arxiv: v1 [math.co] 6 Mar 2008 An uppe bound fo the numbe of pefect matchings in gaphs Shmuel Fiedland axiv:0803.0864v [math.co] 6 Ma 2008 Depatment of Mathematics, Statistics, and Compute Science, Univesity of Illinois at Chicago Chicago,

More information

Berkeley Math Circle AIME Preparation March 5, 2013

Berkeley Math Circle AIME Preparation March 5, 2013 Algeba Toolkit Rules of Thumb. Make sue that you can pove all fomulas you use. This is even bette than memoizing the fomulas. Although it is best to memoize, as well. Stive fo elegant, economical methods.

More information

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0}, ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability

More information

Some RSA-based Encryption Schemes with Tight Security Reduction

Some RSA-based Encryption Schemes with Tight Security Reduction Some RSA-based Encyption Schemes with Tight Secuity Reduction Kaou Kuosawa 1 and Tsuyoshi Takagi 2 1 Ibaaki Univesity, 4-12-1 Nakanausawa, Hitachi, Ibaaki, 316-8511, Japan kuosawa@cis.ibaaki.ac.jp 2 Technische

More information

Quasi-Randomness and the Distribution of Copies of a Fixed Graph

Quasi-Randomness and the Distribution of Copies of a Fixed Graph Quasi-Randomness and the Distibution of Copies of a Fixed Gaph Asaf Shapia Abstact We show that if a gaph G has the popety that all subsets of vetices of size n/4 contain the coect numbe of tiangles one

More information

Internet Appendix for A Bayesian Approach to Real Options: The Case of Distinguishing Between Temporary and Permanent Shocks

Internet Appendix for A Bayesian Approach to Real Options: The Case of Distinguishing Between Temporary and Permanent Shocks Intenet Appendix fo A Bayesian Appoach to Real Options: The Case of Distinguishing Between Tempoay and Pemanent Shocks Steven R. Genadie Gaduate School of Business, Stanfod Univesity Andey Malenko Gaduate

More information

arxiv: v2 [math.ag] 4 Jul 2012

arxiv: v2 [math.ag] 4 Jul 2012 SOME EXAMPLES OF VECTOR BUNDLES IN THE BASE LOCUS OF THE GENERALIZED THETA DIVISOR axiv:0707.2326v2 [math.ag] 4 Jul 2012 SEBASTIAN CASALAINA-MARTIN, TAWANDA GWENA, AND MONTSERRAT TEIXIDOR I BIGAS Abstact.

More information

A New Attack on RSA with Two or Three Decryption Exponents

A New Attack on RSA with Two or Three Decryption Exponents A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Mathématiques Nicolas Oresme Université de Caen, France nitaj@math.unicaen.fr http://www.math.unicaen.fr/~nitaj

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Septembe 5, 011 Abstact To study how balanced o unbalanced a maximal intesecting

More information

On the Poisson Approximation to the Negative Hypergeometric Distribution

On the Poisson Approximation to the Negative Hypergeometric Distribution BULLETIN of the Malaysian Mathematical Sciences Society http://mathusmmy/bulletin Bull Malays Math Sci Soc (2) 34(2) (2011), 331 336 On the Poisson Appoximation to the Negative Hypegeometic Distibution

More information

Lecture 25: Pairing Based Cryptography

Lecture 25: Pairing Based Cryptography 6.897 Special Topics in Cyptogaphy Instucto: Ran Canetti May 5, 2004 Lectue 25: Paiing Based Cyptogaphy Scibe: Ben Adida 1 Intoduction The field of Paiing Based Cyptogaphy has exploded ove the past 3 yeas

More information

KOEBE DOMAINS FOR THE CLASSES OF FUNCTIONS WITH RANGES INCLUDED IN GIVEN SETS

KOEBE DOMAINS FOR THE CLASSES OF FUNCTIONS WITH RANGES INCLUDED IN GIVEN SETS Jounal of Applied Analysis Vol. 14, No. 1 2008), pp. 43 52 KOEBE DOMAINS FOR THE CLASSES OF FUNCTIONS WITH RANGES INCLUDED IN GIVEN SETS L. KOCZAN and P. ZAPRAWA Received Mach 12, 2007 and, in evised fom,

More information

Vanishing lines in generalized Adams spectral sequences are generic

Vanishing lines in generalized Adams spectral sequences are generic ISSN 364-0380 (on line) 465-3060 (pinted) 55 Geomety & Topology Volume 3 (999) 55 65 Published: 2 July 999 G G G G T T T G T T T G T G T GG TT G G G G GG T T T TT Vanishing lines in genealized Adams spectal

More information

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let

More information

Hua Xu 3 and Hiroaki Mukaidani 33. The University of Tsukuba, Otsuka. Hiroshima City University, 3-4-1, Ozuka-Higashi

Hua Xu 3 and Hiroaki Mukaidani 33. The University of Tsukuba, Otsuka. Hiroshima City University, 3-4-1, Ozuka-Higashi he inea Quadatic Dynamic Game fo Discete-ime Descipto Systems Hua Xu 3 and Hioai Muaidani 33 3 Gaduate School of Systems Management he Univesity of suuba, 3-9- Otsua Bunyo-u, oyo -0, Japan xuhua@gssm.otsua.tsuuba.ac.jp

More information

Information Retrieval Advanced IR models. Luca Bondi

Information Retrieval Advanced IR models. Luca Bondi Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the

More information

Fixed Argument Pairing Inversion on Elliptic Curves

Fixed Argument Pairing Inversion on Elliptic Curves Fixed Agument Paiing Invesion on Elliptic Cuves Sungwook Kim and Jung Hee Cheon ISaC & Dept. of Mathematical Sciences Seoul National Univesity Seoul, Koea {avell7,jhcheon}@snu.ac.k Abstact. Let E be an

More information

Asymptotically Lacunary Statistical Equivalent Sequence Spaces Defined by Ideal Convergence and an Orlicz Function

Asymptotically Lacunary Statistical Equivalent Sequence Spaces Defined by Ideal Convergence and an Orlicz Function "Science Stays Tue Hee" Jounal of Mathematics and Statistical Science, 335-35 Science Signpost Publishing Asymptotically Lacunay Statistical Equivalent Sequence Spaces Defined by Ideal Convegence and an

More information

Lifting Private Information Retrieval from Two to any Number of Messages

Lifting Private Information Retrieval from Two to any Number of Messages Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu

More information

Solving Some Definite Integrals Using Parseval s Theorem

Solving Some Definite Integrals Using Parseval s Theorem Ameican Jounal of Numeical Analysis 4 Vol. No. 6-64 Available online at http://pubs.sciepub.com/ajna///5 Science and Education Publishing DOI:.69/ajna---5 Solving Some Definite Integals Using Paseval s

More information

Chromatic number and spectral radius

Chromatic number and spectral radius Linea Algeba and its Applications 426 2007) 810 814 www.elsevie.com/locate/laa Chomatic numbe and spectal adius Vladimi Nikifoov Depatment of Mathematical Sciences, Univesity of Memphis, Memphis, TN 38152,

More information

CENTRAL INDEX BASED SOME COMPARATIVE GROWTH ANALYSIS OF COMPOSITE ENTIRE FUNCTIONS FROM THE VIEW POINT OF L -ORDER. Tanmay Biswas

CENTRAL INDEX BASED SOME COMPARATIVE GROWTH ANALYSIS OF COMPOSITE ENTIRE FUNCTIONS FROM THE VIEW POINT OF L -ORDER. Tanmay Biswas J Koean Soc Math Educ Se B: Pue Appl Math ISSNPint 16-0657 https://doiog/107468/jksmeb01853193 ISSNOnline 87-6081 Volume 5, Numbe 3 August 018, Pages 193 01 CENTRAL INDEX BASED SOME COMPARATIVE GROWTH

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

Identification of the degradation of railway ballast under a concrete sleeper

Identification of the degradation of railway ballast under a concrete sleeper Identification of the degadation of ailway ballast unde a concete sleepe Qin Hu 1) and Heung Fai Lam ) 1), ) Depatment of Civil and Achitectual Engineeing, City Univesity of Hong Kong, Hong Kong SAR, China.

More information

Journal of Number Theory

Journal of Number Theory Jounal of umbe Theoy 3 2 2259 227 Contents lists available at ScienceDiect Jounal of umbe Theoy www.elsevie.com/locate/jnt Sums of poducts of hypegeometic Benoulli numbes Ken Kamano Depatment of Geneal

More information

A STABILITY RESULT FOR p-harmonic SYSTEMS WITH DISCONTINUOUS COEFFICIENTS. Bianca Stroffolini. 0. Introduction

A STABILITY RESULT FOR p-harmonic SYSTEMS WITH DISCONTINUOUS COEFFICIENTS. Bianca Stroffolini. 0. Introduction Electonic Jounal of Diffeential Equations, Vol. 2001(2001), No. 02, pp. 1 7. ISSN: 1072-6691. URL: http://ejde.math.swt.edu o http://ejde.math.unt.edu ftp ejde.math.swt.edu (login: ftp) A STABILITY RESULT

More information

Numerical approximation to ζ(2n+1)

Numerical approximation to ζ(2n+1) Illinois Wesleyan Univesity Fom the SelectedWoks of Tian-Xiao He 6 Numeical appoximation to ζ(n+1) Tian-Xiao He, Illinois Wesleyan Univesity Michael J. Dancs Available at: https://woks.bepess.com/tian_xiao_he/6/

More information

PROBLEM SET #1 SOLUTIONS by Robert A. DiStasio Jr.

PROBLEM SET #1 SOLUTIONS by Robert A. DiStasio Jr. POBLM S # SOLUIONS by obet A. DiStasio J. Q. he Bon-Oppenheime appoximation is the standad way of appoximating the gound state of a molecula system. Wite down the conditions that detemine the tonic and

More information

Miskolc Mathematical Notes HU e-issn Tribonacci numbers with indices in arithmetic progression and their sums. Nurettin Irmak and Murat Alp

Miskolc Mathematical Notes HU e-issn Tribonacci numbers with indices in arithmetic progression and their sums. Nurettin Irmak and Murat Alp Miskolc Mathematical Notes HU e-issn 8- Vol. (0), No, pp. 5- DOI 0.85/MMN.0.5 Tibonacci numbes with indices in aithmetic pogession and thei sums Nuettin Imak and Muat Alp Miskolc Mathematical Notes HU

More information

DonnishJournals

DonnishJournals DonnishJounals 041-1189 Donnish Jounal of Educational Reseach and Reviews. Vol 1(1) pp. 01-017 Novembe, 014. http:///dje Copyight 014 Donnish Jounals Oiginal Reseach Pape Vecto Analysis Using MAXIMA Savaş

More information

THE MAXIMUM SIZE OF A PARTIAL SPREAD II: UPPER BOUNDS

THE MAXIMUM SIZE OF A PARTIAL SPREAD II: UPPER BOUNDS THE MAXIMUM SIZE OF A PARTIAL SPREAD II: UPPER BOUNDS ESMERALDA NĂSTASE MATHEMATICS DEPARTMENT XAVIER UNIVERSITY CINCINNATI, OHIO 4507, USA PAPA SISSOKHO MATHEMATICS DEPARTMENT ILLINOIS STATE UNIVERSITY

More information

Quantum Fourier Transform

Quantum Fourier Transform Chapte 5 Quantum Fouie Tansfom Many poblems in physics and mathematics ae solved by tansfoming a poblem into some othe poblem with a known solution. Some notable examples ae Laplace tansfom, Legende tansfom,

More information

ON LACUNARY INVARIANT SEQUENCE SPACES DEFINED BY A SEQUENCE OF MODULUS FUNCTIONS

ON LACUNARY INVARIANT SEQUENCE SPACES DEFINED BY A SEQUENCE OF MODULUS FUNCTIONS STUDIA UNIV BABEŞ BOLYAI, MATHEMATICA, Volume XLVIII, Numbe 4, Decembe 2003 ON LACUNARY INVARIANT SEQUENCE SPACES DEFINED BY A SEQUENCE OF MODULUS FUNCTIONS VATAN KARAKAYA AND NECIP SIMSEK Abstact The

More information

Computers and Mathematics with Applications

Computers and Mathematics with Applications Computes and Mathematics with Applications 58 (009) 9 7 Contents lists available at ScienceDiect Computes and Mathematics with Applications jounal homepage: www.elsevie.com/locate/camwa Bi-citeia single

More information

A Converse to Low-Rank Matrix Completion

A Converse to Low-Rank Matrix Completion A Convese to Low-Rank Matix Completion Daniel L. Pimentel-Alacón, Robet D. Nowak Univesity of Wisconsin-Madison Abstact In many pactical applications, one is given a subset Ω of the enties in a d N data

More information

Application of homotopy perturbation method to the Navier-Stokes equations in cylindrical coordinates

Application of homotopy perturbation method to the Navier-Stokes equations in cylindrical coordinates Computational Ecology and Softwae 5 5(): 9-5 Aticle Application of homotopy petubation method to the Navie-Stokes equations in cylindical coodinates H. A. Wahab Anwa Jamal Saia Bhatti Muhammad Naeem Muhammad

More information

An Application of Fuzzy Linear System of Equations in Economic Sciences

An Application of Fuzzy Linear System of Equations in Economic Sciences Austalian Jounal of Basic and Applied Sciences, 5(7): 7-14, 2011 ISSN 1991-8178 An Application of Fuzzy Linea System of Equations in Economic Sciences 1 S.H. Nassei, 2 M. Abdi and 3 B. Khabii 1 Depatment

More information

A Power Method for Computing Square Roots of Complex Matrices

A Power Method for Computing Square Roots of Complex Matrices JOURNAL OF MATHEMATICAL ANALYSIS AND APPLICATIONS 13, 39345 1997 ARTICLE NO. AY975517 A Powe Method fo Computing Squae Roots of Complex Matices Mohammed A. Hasan Depatment of Electical Engineeing, Coloado

More information

Do Managers Do Good With Other People s Money? Online Appendix

Do Managers Do Good With Other People s Money? Online Appendix Do Manages Do Good With Othe People s Money? Online Appendix Ing-Haw Cheng Haison Hong Kelly Shue Abstact This is the Online Appendix fo Cheng, Hong and Shue 2013) containing details of the model. Datmouth

More information

A Multivariate Normal Law for Turing s Formulae

A Multivariate Normal Law for Turing s Formulae A Multivaiate Nomal Law fo Tuing s Fomulae Zhiyi Zhang Depatment of Mathematics and Statistics Univesity of Noth Caolina at Chalotte Chalotte, NC 28223 Abstact This pape establishes a sufficient condition

More information

Mean Curvature and Shape Operator of Slant Immersions in a Sasakian Space Form

Mean Curvature and Shape Operator of Slant Immersions in a Sasakian Space Form Mean Cuvatue and Shape Opeato of Slant Immesions in a Sasakian Space Fom Muck Main Tipathi, Jean-Sic Kim and Son-Be Kim Abstact Fo submanifolds, in a Sasakian space fom, which ae tangential to the stuctue

More information

(n 1)n(n + 1)(n + 2) + 1 = (n 1)(n + 2)n(n + 1) + 1 = ( (n 2 + n 1) 1 )( (n 2 + n 1) + 1 ) + 1 = (n 2 + n 1) 2.

(n 1)n(n + 1)(n + 2) + 1 = (n 1)(n + 2)n(n + 1) + 1 = ( (n 2 + n 1) 1 )( (n 2 + n 1) + 1 ) + 1 = (n 2 + n 1) 2. Paabola Volume 5, Issue (017) Solutions 151 1540 Q151 Take any fou consecutive whole numbes, multiply them togethe and add 1. Make a conjectue and pove it! The esulting numbe can, fo instance, be expessed

More information

Research Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function

Research Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function Abstact and Applied Analysis Volume 011, Aticle ID 697547, 7 pages doi:10.1155/011/697547 Reseach Aticle On Alze and Qiu s Conjectue fo Complete Elliptic Integal and Invese Hypebolic Tangent Function Yu-Ming

More information

On the integration of the equations of hydrodynamics

On the integration of the equations of hydrodynamics Uebe die Integation de hydodynamischen Gleichungen J f eine u angew Math 56 (859) -0 On the integation of the equations of hydodynamics (By A Clebsch at Calsuhe) Tanslated by D H Delphenich In a pevious

More information

Multiple Experts with Binary Features

Multiple Experts with Binary Features Multiple Expets with Binay Featues Ye Jin & Lingen Zhang Decembe 9, 2010 1 Intoduction Ou intuition fo the poect comes fom the pape Supevised Leaning fom Multiple Expets: Whom to tust when eveyone lies

More information

Failure Probability of 2-within-Consecutive-(2, 2)-out-of-(n, m): F System for Special Values of m

Failure Probability of 2-within-Consecutive-(2, 2)-out-of-(n, m): F System for Special Values of m Jounal of Mathematics and Statistics 5 (): 0-4, 009 ISSN 549-3644 009 Science Publications Failue Pobability of -within-consecutive-(, )-out-of-(n, m): F System fo Special Values of m E.M.E.. Sayed Depatment

More information

q i i=1 p i ln p i Another measure, which proves a useful benchmark in our analysis, is the chi squared divergence of p, q, which is defined by

q i i=1 p i ln p i Another measure, which proves a useful benchmark in our analysis, is the chi squared divergence of p, q, which is defined by CSISZÁR f DIVERGENCE, OSTROWSKI S INEQUALITY AND MUTUAL INFORMATION S. S. DRAGOMIR, V. GLUŠČEVIĆ, AND C. E. M. PEARCE Abstact. The Ostowski integal inequality fo an absolutely continuous function is used

More information

Results on the Commutative Neutrix Convolution Product Involving the Logarithmic Integral li(

Results on the Commutative Neutrix Convolution Product Involving the Logarithmic Integral li( Intenational Jounal of Scientific and Innovative Mathematical Reseach (IJSIMR) Volume 2, Issue 8, August 2014, PP 736-741 ISSN 2347-307X (Pint) & ISSN 2347-3142 (Online) www.acjounals.og Results on the

More information

Available online through ISSN

Available online through  ISSN Intenational eseach Jounal of Pue Algeba -() 01 98-0 Available online though wwwjpainfo ISSN 8 907 SOE ESULTS ON THE GOUP INVESE OF BLOCK ATIX OVE IGHT OE DOAINS Hanyu Zhang* Goup of athematical Jidong

More information

On Continued Fraction of Order Twelve

On Continued Fraction of Order Twelve Pue Mathematical Sciences, Vol. 1, 2012, no. 4, 197-205 On Continued Faction of Ode Twelve B. N. Dhamenda*, M. R. Rajesh Kanna* and R. Jagadeesh** *Post Gaduate Depatment of Mathematics Mahaani s Science

More information

3.1 Random variables

3.1 Random variables 3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated

More information

On the Number of Rim Hook Tableaux. Sergey Fomin* and. Nathan Lulov. Department of Mathematics. Harvard University

On the Number of Rim Hook Tableaux. Sergey Fomin* and. Nathan Lulov. Department of Mathematics. Harvard University Zapiski Nauchn. Seminaov POMI, to appea On the Numbe of Rim Hook Tableaux Segey Fomin* Depatment of Mathematics, Massachusetts Institute of Technology Cambidge, MA 0239 Theoy of Algoithms Laboatoy SPIIRAN,

More information

Chapter 5 Linear Equations: Basic Theory and Practice

Chapter 5 Linear Equations: Basic Theory and Practice Chapte 5 inea Equations: Basic Theoy and actice In this chapte and the next, we ae inteested in the linea algebaic equation AX = b, (5-1) whee A is an m n matix, X is an n 1 vecto to be solved fo, and

More information

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated

More information

( ) [ ] [ ] [ ] δf φ = F φ+δφ F. xdx.

( ) [ ] [ ] [ ] δf φ = F φ+δφ F. xdx. 9. LAGRANGIAN OF THE ELECTROMAGNETIC FIELD In the pevious section the Lagangian and Hamiltonian of an ensemble of point paticles was developed. This appoach is based on a qt. This discete fomulation can

More information

Duality between Statical and Kinematical Engineering Systems

Duality between Statical and Kinematical Engineering Systems Pape 00, Civil-Comp Ltd., Stiling, Scotland Poceedings of the Sixth Intenational Confeence on Computational Stuctues Technology, B.H.V. Topping and Z. Bittna (Editos), Civil-Comp Pess, Stiling, Scotland.

More information

Integral operator defined by q-analogue of Liu-Srivastava operator

Integral operator defined by q-analogue of Liu-Srivastava operator Stud. Univ. Babeş-Bolyai Math. 582013, No. 4, 529 537 Integal opeato defined by q-analogue of Liu-Sivastava opeato Huda Aldweby and Maslina Daus Abstact. In this pape, we shall give an application of q-analogues

More information

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix Jounal of Sciences, Islamic Republic of Ian (): - () Univesity of Tehan, ISSN - http://sciencesutaci Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matix H Ahsani

More information

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension Intenational Mathematical Foum, 3, 2008, no. 16, 763-776 Functions Defined on Fuzzy Real Numbes Accoding to Zadeh s Extension Oma A. AbuAaqob, Nabil T. Shawagfeh and Oma A. AbuGhneim 1 Mathematics Depatment,

More information

arxiv: v1 [math.nt] 12 May 2017

arxiv: v1 [math.nt] 12 May 2017 SEQUENCES OF CONSECUTIVE HAPPY NUMBERS IN NEGATIVE BASES HELEN G. GRUNDMAN AND PAMELA E. HARRIS axiv:1705.04648v1 [math.nt] 12 May 2017 ABSTRACT. Fo b 2 and e 2, let S e,b : Z Z 0 be the function taking

More information

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution Applied Mathematical Sciences, Vol 11, 2017, no 27, 1337-1351 HIKARI Ltd, wwwm-hikaicom https://doiog/1012988/ams20177273 On the Quasi-invese of a Non-squae Matix: An Infinite Solution Ruben D Codeo J

More information

A Short Combinatorial Proof of Derangement Identity arxiv: v1 [math.co] 13 Nov Introduction

A Short Combinatorial Proof of Derangement Identity arxiv: v1 [math.co] 13 Nov Introduction A Shot Combinatoial Poof of Deangement Identity axiv:1711.04537v1 [math.co] 13 Nov 2017 Ivica Matinjak Faculty of Science, Univesity of Zageb Bijenička cesta 32, HR-10000 Zageb, Coatia and Dajana Stanić

More information

On a generalization of Eulerian numbers

On a generalization of Eulerian numbers Notes on Numbe Theoy and Discete Mathematics Pint ISSN 1310 513, Online ISSN 367 875 Vol, 018, No 1, 16 DOI: 10756/nntdm018116- On a genealization of Euleian numbes Claudio Pita-Ruiz Facultad de Ingenieía,

More information

arxiv: v1 [math.co] 4 May 2017

arxiv: v1 [math.co] 4 May 2017 On The Numbe Of Unlabeled Bipatite Gaphs Abdullah Atmaca and A Yavuz Ouç axiv:7050800v [mathco] 4 May 207 Abstact This pape solves a poblem that was stated by M A Haison in 973 [] This poblem, that has

More information

Model and Controller Order Reduction for Infinite Dimensional Systems

Model and Controller Order Reduction for Infinite Dimensional Systems IT J. Eng. Sci., Vol. 4, No.,, -6 Model and Contolle Ode Reduction fo Infinite Dimensional Systems Fatmawati,*, R. Saagih,. Riyanto 3 & Y. Soehayadi Industial and Financial Mathematics Goup email: fatma47@students.itb.ac.id;

More information

Perturbation to Symmetries and Adiabatic Invariants of Nonholonomic Dynamical System of Relative Motion

Perturbation to Symmetries and Adiabatic Invariants of Nonholonomic Dynamical System of Relative Motion Commun. Theo. Phys. Beijing, China) 43 25) pp. 577 581 c Intenational Academic Publishes Vol. 43, No. 4, Apil 15, 25 Petubation to Symmeties and Adiabatic Invaiants of Nonholonomic Dynamical System of

More information

Temporal-Difference Learning

Temporal-Difference Learning .997 Decision-Making in Lage-Scale Systems Mach 17 MIT, Sping 004 Handout #17 Lectue Note 13 1 Tempoal-Diffeence Leaning We now conside the poblem of computing an appopiate paamete, so that, given an appoximation

More information

Bounds for Codimensions of Fitting Ideals

Bounds for Codimensions of Fitting Ideals Ž. JOUNAL OF ALGEBA 194, 378 382 1997 ATICLE NO. JA966999 Bounds fo Coensions of Fitting Ideals Michał Kwiecinski* Uniwesytet Jagiellonski, Instytut Matematyki, ul. eymonta 4, 30-059, Kakow, Poland Communicated

More information